-
Component Upgrade
-
Resolution: Done-Errata
-
Major
-
None
-
False
-
None
-
False
-
-
-
-
-
-
-
Tag: https://gitlab.cee.redhat.com/undertow-io/undertow/-/commits/2.2.28.SP1
Diff: https://gitlab.cee.redhat.com/undertow-io/undertow/-/compare/2.2.26.SP1...2.2.28.SP1
Hash: a9c1f659ce40c444b64ef2404f96f8ffdc63555d
- blocks
-
RHPAM-4816 [Major Incident] CVE-2023-44487 undertow: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) [rhpam-7]
- Closed
- incorporates
-
JBEAP-25455 [GSS](7.4.z) UNDERTOW-2296 - Wrong type in INCLUDE_MAPPING request attribute
- Closed
-
JBEAP-25735 [GSS](7.4.z) UNDERTOW-2313 - NPE occurs in session invalidation if a session creation attempt hits UNDERTOW-1971
- Closed
-
JBEAP-25824 [GSS](7.4.z) UNDERTOW-2305 - Messaging clients are not load-balanced using Undertow loadbalancer
- Closed
-
JBEAP-25833 (7.4.z) UNDERTOW-2316 - Unify InMemorySessionManager getSession() method behavior with DistributableSessionManager
- Closed
- is cloned by
-
WFCORE-6555 CVE-2023-3223 Upgrade Undertow to 2.3.9.Final
- Resolved
-
WFCORE-6564 CVE-2023-44487 Upgrade Undertow to 2.3.10.Final
- Resolved
- is incorporated by
-
JBEAP-25380 (7.4.z) Upgrade WildFly Core from 15.0.30.Final-redhat-00001 to 15.0.31.Final-redhat-00001
- Closed
- links to
-
RHBA-2023:117079 Red Hat JBoss Enterprise Application Platform 7.4.14 Update
-
RHSA-2023:117080 Red Hat JBoss Enterprise Application Platform 7.4.14 Update
-
RHSA-2023:117081 Red Hat JBoss Enterprise Application Platform 7.4.14 Security update
-
RHSA-2023:117082 Red Hat JBoss Enterprise Application Platform 7.4.14 Security update
-
RHSA-2023:121976 Red Hat JBoss Enterprise Application Platform 7.4 security update
-
RHSA-2023:121977 Red Hat JBoss Enterprise Application Platform 7.4 security update
-
RHSA-2023:121982 Red Hat JBoss EAP 7.4.13 XP 4.0.0.GA security release